File tree 8 files changed +10
-10
lines changed
secure-cross-regional-bucket
8 files changed +10
-10
lines changed Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.6 "
7
+ version = " 1.2.0 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
@@ -50,7 +50,7 @@ locals {
50
50
51
51
module "key_protect_all_inclusive" {
52
52
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
53
- version = " 4.21.3 "
53
+ version = " 4.21.5 "
54
54
key_protect_instance_name = " ${ var . prefix } -kp"
55
55
resource_group_id = module. resource_group . resource_group_id
56
56
enable_metrics = false
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.6 "
7
+ version = " 1.2.0 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.6 "
7
+ version = " 1.2.0 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.6 "
7
+ version = " 1.2.0 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.6 "
7
+ version = " 1.2.0 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 1
1
module "resource_group" {
2
2
source = " terraform-ibm-modules/resource-group/ibm"
3
- version = " 1.1.6 "
3
+ version = " 1.2.0 "
4
4
resource_group_name = var. use_existing_resource_group == false ? ((var. prefix != null && var. prefix != " " ) ? " ${ var . prefix } -${ var . resource_group_name } " : var. resource_group_name ) : null
5
5
existing_resource_group_name = var. use_existing_resource_group == true ? var. resource_group_name : null
6
6
}
@@ -69,7 +69,7 @@ module "secrets_manager_service_credentials" {
69
69
count = length (local. service_credential_secrets ) > 0 ? 1 : 0
70
70
depends_on = [time_sleep . wait_for_cos_authorization_policy ]
71
71
source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
72
- version = " 2.0.0 "
72
+ version = " 2.1.1 "
73
73
existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
74
74
existing_sm_instance_region = local. existing_secrets_manager_instance_region
75
75
endpoint_type = var. existing_secrets_manager_endpoint_type
Original file line number Diff line number Diff line change @@ -127,7 +127,7 @@ module "kms" {
127
127
}
128
128
count = var. existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key.
129
129
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
130
- version = " 4.21.3 "
130
+ version = " 4.21.5 "
131
131
create_key_protect_instance = false
132
132
region = local. existing_kms_instance_region
133
133
existing_kms_instance_crn = var. existing_kms_instance_crn
Original file line number Diff line number Diff line change @@ -129,7 +129,7 @@ module "kms" {
129
129
}
130
130
count = var. existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key
131
131
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
132
- version = " 4.21.3 "
132
+ version = " 4.21.5 "
133
133
create_key_protect_instance = false
134
134
region = local. existing_kms_instance_region
135
135
existing_kms_instance_crn = var. existing_kms_instance_crn
You can’t perform that action at this time.
0 commit comments